QUESTION 284Check Point APIs allow system engineers and developers to make changes to their organization’s security policy with CLI tools and Web Services for all of the following except:

A. Create new dashboards to manage 3rd party taskB. Create products that use and enhance 3rd party solutionsC. Execute automated scripts to perform common tasksD. Create products that use and enhance the Check Point Solution

Answer: A

QUESTION 285In what way are SSL VPN and IPSec VPN different?

A. SSL VPN is using HTTPS in addition to IKE, whereas IPSec VPN is clientlessB. SSL VPN adds an extra VPN header to the packet, IPSec VPN does notC. IPSec VPN does not support two factor authentication, SSL VPN does support thisD. IPSec VPN uses an additional virtual adapter, SSL VPN uses the client network adapter only

Answer: D

QUESTION 286Which command can you use to enable or disable multi-queue per interface?

A. cpmq setB. Cpmqueue setC. Cpmq configD. Set cpmq enable

Answer: A

QUESTION 287Which limitation of CoreXL is overcome by using (mitigated by) Multi-Queue?

A. There is no traffic queue to be handledB. Several NICs can use one traffic queue by one CPUC. Each NIC has several traffic queues that are handled by multiple CPU coresD. Each NIC has one traffic queue that is handled by one CPU

Answer: C

QUESTION 288To fully enable Dynamic Dispatcher on a Security Gateway:

A. run fw ctl multik set_mode 9 in Expert mode and then rebootB. Using cpconfig, update the Dynamic Dispatcher value to “full” under the CoreXL menuC. Edit /proc/interrupts to include multik set_mode 1 at the bottom of the file, save, and rebootD. run fw ctl multik set_mode 1 in Expert mode and then reboot

Answer: A

QUESTION 289What are types of Check Point APIs available currently as part of R80.10 code?

A. The Firewall kernel only touches the packet if the connection is acceleratedB. The Firewall can run different policies per coreC. The Firewall kernel is replicated only with new connections and deletes itself once the connection times outD. The Firewall can run the same policy on all cores

Answer: D

QUESTION 292There are 4 ways to use the Management API for creating host object with R80 Management API. Which one is NOT correct?

A. Using Web ServicesB. Using Mgmt_cli toolC. Using CLISHD. Using SmartConsole GUI console

Answer: C

QUESTION 293Which the following type of authentication on Mobile Access can NOT be used as the first authentication method?

A. Dynamic IDB. RADIUSC. Username and PasswordD. Certificate

Answer: A

QUESTION 294Which command can you use to verify the number of active concurrent connections?